نتایج جستجو
Women, Gender, and Terrorism (Studies in Security and International Affairs)
Laura Sjoberg, 2011
CCSE NG: Check Point Certified Security Expert Study Guide
Valerie Laveille
Security Forces in Northern Ireland 1969-92
Tim Ripley, 1993
Security Forces in Northern Ireland 1969-92
Tim Ripley
Inside Internet Security: What Hackers Don't Want You To Know
Jeff Crume, 2000
Managing Critical Infrastructure Risks: Decision Tools and Applications for Port Security
Richard J. Wenning, 2007
The Nexus: International Terrorism and Drug Trafficking from Afghanistan (Praeger Security International)
Frank C. Shanty Ph.D., 2011
Providing for National Security: A Comparative Analysis
Andrew Dorman, 2014
Security and Safety in Los Angeles High Rise Building After 9 11
Rae Archibald, 2002
Introduction to Information Security. A Strategic-Based Approach
Timothy Shimeall, 2014
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon, 2016
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures
Keijo Haataja, 2013
Securing the API Stronghold: The Ultimate Guide to API Security
Travis Spencer, 2015
